Breadcrumb

IoT/Device Credentialing

The IoT is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. At the same time, a quick scan of the headlines reveals real security concerns that come with connected devices that can be remotely attacked and used for nefarious purposes. Thales eSecurity is here to help you secure your IoT digital transformation.

Thales eSecurity works with IoT device manufacturers and end users to inject keys and PKI digital certificates to form a root of trust and enable strong authentication for connected devices.

Once a device comes online it can become a target for cybercriminals who wish to exploit vulnerabilities to find an entry point to networked systems or introduce malicious code.

Issuing Bug Fixes and Other Updates

No manufacturer intends to deploy products with software bugs, but it does happen. Likewise, developers may wish to add new features and functionality to devices that have already gone out the door, potentially opening up additional revenue streams. While customers recognize that code updates may be required on occasion, producers must do so with minimal downtime and a process which ensures authenticity and integrity of the updates to ensure a positive customer experience and protect revenues.

Unauthorized Production

Unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.

Device Authentication

IoT experts across the industry agree: Strong device authentication is required to ensure that connected devices can be trusted. Thales eSecurity helps manufacturers create a unique device identity that can be authenticated when a device attempts to connect to a gateway or central server. With this unique ID in place, you can track each device throughout its lifecycle, communicate securely with it and prevent it from executing harmful processes. If a device exhibits unexpected behavior, you can simply revoke its privileges.

Code Signing

To ensure the integrity of software and firmware updates, and defend against the risks associated with code tampering or code that deviates from organizational policies, the code must be signed as a key step in the software release process. Thales eSecurity has extensive expertise with code signing best practices, including securing signing keys using tamper-resistant hardware security modules.

Secure Manufacturing

Using Thales nShield HSMs and supporting security software, manufacturers can inject keys and digital certificates, and control the number of units built and the code incorporated into each.

Defense Against Attacks

By establishing trust in your connected devices, you can help ensure only authorized activity on your enterprise networks, providing better defense against attacks on data stores and corporate IP.

Cost Savings and Revenue Opportunities

With the ability to update devices deployed in the field, you can reduce the time and costs associated with in-person updates. You can also deliver firmware updates that create new revenue opportunities through improved product performance or additional functionality.

Protect Against Brand and Financial Damage

By defending against the production of unauthorized units you can mitigate the brand and financial damage associated with overbuilding and cloning, especially with remote manufacturing facilities.

Solution Brief : Thales HSMs Enable the Root of Trust in IOT Devices

The Internet of Things requires security and trust in order to reach its full potential. The explosion of the IoT introduces significant opportunities – as well as potential threats.

Case Studies : Polycom

Polycom uses Thales nShield HSMs to give each of its phones a unique identity, making it easier to identify them on customer and service providers’ networks while thwarting would-be counterfeiters and fraudsters.

Vormetric Encryption delivers what we need it to do – without any fuss or drama – knowing it’s in place is one less thing to worry about.Albert AvilaBusiness Solutions Specialist, Fujitsu America, Inc.

The Vormetric solution not only solved all of our encryption needs but alleviated any fears of the complexity and overhead of managing the environment once it was in place.Joseph Johnson,chief information security officer CHS

My concern with encryption was the overhead on user and application performance. With Thales eSecurity, people have no idea it’s even running.Karl MudraCIODelta Dental of Missouri

Vormetric’s approach of coupling access control with encryption is a very powerful combination. We use it to demonstrate to clients our commitment to preserving the security and integrity of their test cases, data and designs.David VargasInformation Security ArchitectCadence Design Systems

Implementing Vormetric has given our own clients an added level of confidence in the relationship they have with us; they know we’re serious about taking care of their data.Audley Deansenior director of Information Security,BMC Software

There is absolutely no noticeable impact on the performance or usability of applications. I am very excited at how easy the solution is to deploy and it has always performed flawlessly.Christian MuusDirector of Security for Teleperformance EMEA

Thales eSecurity is our standard. Whenever an encryption solution is needed, the answer is always, ‘let’s start with Thales eSecurity.Damian McDonaldVice President of Global Information Security, Becton, Dickinson and Company